scispace - formally typeset
Search or ask a question
Book ChapterDOI

A Reference Based Secure and Robust Zero Watermarking System

TL;DR: A new approach for zero-watermarking has been proposed based on log-polar mapping, all phase biorthogonal sine transform and singular value decomposition to produce a zero watermark to protect the copyright of the image.
Abstract: In this paper, a new approach for zero-watermarking has been proposed based on log-polar mapping, all phase biorthogonal sine transform and singular value decomposition. The core idea is to produce a zero watermark to protect the copyright of the image. For this purpose, the host image is transformed into the log-polar domain followed by the all phase biorthogonal sine transform (APBST). The transformed coefficients are then divided into nonoverlapping blocks and some blocks are selected based on secret key. These blocks are finally used to formulate a reference matrix which is utilized to generate a zero watermark for the host image. A detailed experimental analysis is conducted to demonstrate the feasibility of the proposed algorithm against various image/signal processing distortions.
Citations
More filters
Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the design of zero-bit watermarking in which a user's unique id is integrated with his facial features in the multi-transform domain is presented. And the model is indeed satisfying security of the host biometric of the user.
Abstract: The security of a system through biometric features is one of the acceptable trends to which every researcher recommends. Such biometric features contain features of iris, fingerprint, face, etc. Today, these security traits are widely exploited by an imposter to trace unlicensed access to the system. So it demands to secure these features since foremost alarming challenges are raises when these trustworthy features are compromised. This paper endorses the design of zero-bit watermarking in which a user’s unique id is integrated with his facial features in the multi-transform domain. The user’s unique ID is used to establish true authentication of the host facial features and also to recognize the face without any segmentation techniques. To make this effort tangible, Singular values are calculated of some particular frequency coefficients of the host image that are generated using FFT transformation in which a number of appropriate regions of the host image are selected based on their frequency of information. These Singular values of host facial image are calculated using SVD in which watermark (image) user’s unique ID is integrated correctly while maintaining the equilibrium among imperceptibility, robustness, and payload. The resultant watermarked image is tested against various image processing attacks and satisfying results are conducted to assure robustness of the model. Thus, the model is indeed satisfying security of the host biometric of the user.
References
More filters
Book
31 Dec 1999
TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.
Abstract: From the Publisher: Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, a description of possible applications, and a survey of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis," methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities and differences to steganography. You gain a working knowledge of watermarking's pros and cons, and you learn the legal implications of watermarking and copyright issues on the Internet.

1,732 citations

Journal ArticleDOI
TL;DR: A wavelet-based copyright-proving scheme that does not require the original image for logo verification is proposed and is strong enough to resist malicious manipulations of an image including blurring, JPEG compression, noising, sharpening, scaling, rotation, cropping, scaling-cropping, and print-photocopy-scan attacks.
Abstract: A wavelet-based copyright-proving scheme that does not require the original image for logo verification is proposed in this paper. The scheme is strong enough to resist malicious manipulations of an image including blurring, JPEG compression, noising, sharpening, scaling, rotation, cropping, scaling-cropping, and print-photocopy-scan attacks. The proposed scheme is also resistant to StirMark and unZign attacks and it is not only a robust method but also a lossless one. Experiments are conducted to show the robustness of this method. Moreover, cryptographic tools, such as digital signature and timestamp, are introduced to make copyright proving publicly verifiable.

105 citations

Journal ArticleDOI
TL;DR: This novel approach allows image owners to adjust the strength of watermarks through a threshold, so that the robustness of the watermark can be enhanced and preserves the data lossless requirement, so it is suitable for medical and artistic images.

100 citations

Journal ArticleDOI
TL;DR: The results show that the DCT/DST scheme provides significant BD-rate improvement over the conventional DCT based scheme for intra prediction in video sequences.
Abstract: In this paper, we present a DCT/DST based transform scheme that applies either the conventional DCT or type-7 DST for all the video-coding intra-prediction modes: vertical, horizontal, and oblique. Our approach is applicable to any block-based intra prediction scheme in a codec that employs transforms along the horizontal and vertical direction separably. Previously, Han, Saxena, and Rose showed that for the intra-predicted residuals of horizontal and vertical modes, the DST is the optimal transform with performance close to the KLT. Here, we prove that this is indeed the case for the other oblique modes. The optimal choice of using DCT or DST is based on intra-prediction modes and requires no additional signaling information or rate-distortion search. The DCT/DST scheme presented in this paper was adopted in the HEVC standardization in March 2011. Further simplifications, especially to reduce implementation complexity, which remove the mode-dependency between DCT and DST, and simply always use DST for the 4 × 4 intra luma blocks, were adopted in the HEVC standard in July 2012. Simulation results conducted for the DCT/DST algorithm are shown in the reference software for the ongoing HEVC standardization. Our results show that the DCT/DST scheme provides significant BD-rate improvement over the conventional DCT based scheme for intra prediction in video sequences.

90 citations

Journal ArticleDOI
TL;DR: Properties of quaternion Exponent moments (QEMs) are discussed in detail in detail and a robust color image zero-watermarking algorithm is proposed which is robust to geometric attacks.

75 citations